Srdjan Arsic

Displaying 1-3 of 3 results

In this paper, the authors present the design and implementation of an application-layer data throughput prediction and optimization service for many-task computing in widely distributed environments. This service uses multiple parallel TCP streams to improve the end-to-end throughput of data transfers. A novel mathematical model is developed to determine the...

Measuring End-to-end packet loss characteristics are modulated more accurately using Probes than in traditional way. Generally measurement and estimation of end-to-end packet loss characters are challenging due to short duration of packet loss episodes. Active probe tools are used to measure packet loss at end-to-end paths which has been show...

The success of cloud computing has attracted attention for cost effective IT services with many signs for continuing spread out if not dominating in the coming years is reported recently. IT services in Cloud Computing face the overwhelming challenges to ensure the proper physical, logical and personnel security controls, especially...

In this paper, the authors present the design and implementation of an application-layer data throughput prediction and optimization service for many-task computing in widely distributed environments. This service uses multiple parallel TCP streams to improve the end-to-end throughput of data transfers. A novel mathematical model is developed to determine the...

Measuring End-to-end packet loss characteristics are modulated more accurately using Probes than in traditional way. Generally measurement and estimation of end-to-end packet loss characters are challenging due to short duration of packet loss episodes. Active probe tools are used to measure packet loss at end-to-end paths which has been show...

The success of cloud computing has attracted attention for cost effective IT services with many signs for continuing spread out if not dominating in the coming years is reported recently. IT services in Cloud Computing face the overwhelming challenges to ensure the proper physical, logical and personnel security controls, especially...

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?